Cookies Cookies are text files with small pieces of data, such as usernames and passwords, that are used to identify your computer network. HTTP cookies are a specific kind of cookie used to identify specific users and to improve user web browsing experiences. Data stored in a cookie is created by the server as you […]
Author: Nikki Pham
Advanced Persistent Threat/APT
Advanced persistent threats (APTs) are sophisticated attacks that can have destructive consequences. The National Institute of Standards and Technology (NIST) has defined an APT as, “An adversary with sophisticated levels of expertise and significant resources, allowing it through the use of multiple different attack vectors (e.g., cyber, physical, and deception) to generate opportunities to achieve […]
Bot Security
“Bot” is short for robot, and it is a software program that performs automated, repetitive, pre-defined tasks. Bots are automated, meaning that they can run according to their instructions without a human needing to manually restart them, and their repetitive actions often imitate or replace human users’ behaviors. Bots typically operate over a network, with […]
Bluetooth Security
Bluetooth technology is a protocol establishing a local network to exchange data wirelessly between nearby devices. Bluetooth works by wirelessly connecting different devices, such as your phone and your hands-free calling feature in your car. This eliminates the need for a USB cable when you want to exchange data between devices. Bluetooth uses short-wavelength UHF […]
What is Malvertising?
Malvertising Malicious advertising is referred to as “malvertising.” Malvertising is a cyberattack technique that injects malicious code within digital ads. These cyberattacks are difficult to detect because these ads are often provided to consumers through legitimate advertising networks. As they are displayed to all visitors to a website, they are particularly harmful as they put […]
Antivirus Solutions Antivirus solutions are programs designed to protect endpoint devices. IT endpoints are the devices that people use to access company resources. Examples of endpoints are personal computers, mobile devices, point-of-sale terminals, and other various devices where data is created, processed, and stored, such as IoT devices. With so many endpoints and their corresponding […]
Secure Website Features
Secure Website Features In your internet travels you have surely encountered links or websites that had you asking yourself, “Is this website secure?” There are many deceptive tactics that cyberattackers can employ to trick you into clicking on their malicious links, but you can protect yourself by knowing some of the signs that the virtual space you […]
CJIS Compliance
CJIS Compliance The Criminal Justice Information Services (CJIS) Division was established in February 1992 to serve as the focal point and central repository for criminal justice information services in the FBI.1 The CJIS Division gives state, local, and federal law enforcement and criminal justice agencies access to criminal justice information (CJI), such as fingerprint records […]
Online Shopping Safety
Safely Shop Online Online shopping is certainly convenient, but it is fraught with hazards. Exert the extra effort required to protect yourself while shopping online and save yourself from the virtual messes that you will need clean up if you don’t. Here are some risks that you need to be aware of to shop safely: […]
Subdomains
Subdomains A subdomain is a prefix added to your original domain name. It is like a domain within a domain, and it may look something like this: www.subdomain.example.com. Subdomains are commonly used by developers to use as a test version while they are creating a website, so that they do not disturb the traffic on […]